Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

29719 bookmarks
Custom sorting
Android malware Konfety uses malformed APKs to evade detection
Android malware Konfety uses malformed APKs to evade detection
A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade analysis and detection.
·bleepingcomputer.com·
Android malware Konfety uses malformed APKs to evade detection
7 Email Security Metrics: Measure Your Protection | CSA
7 Email Security Metrics: Measure Your Protection | CSA
Understand essential email security metrics that reveal the strength of your protection and highlight areas for improvement in your security program.
·cloudsecurityalliance.org·
7 Email Security Metrics: Measure Your Protection | CSA
SaaS Security Adoption Grows Amid Rising Breach Rates
SaaS Security Adoption Grows Amid Rising Breach Rates
The latest report from AppOmni has revealed 91% confidence in SaaS security while 75% of organizations have faced incidents
·infosecurity-magazine.com·
SaaS Security Adoption Grows Amid Rising Breach Rates
Des images satellites montrent l’impact des frappes iraniennes sur la base américaine au Qatar (photos)
Des images satellites montrent l’impact des frappes iraniennes sur la base américaine au Qatar (photos)
Depuis le 11 juillet 2025, de nombreux clichés récoltés par l'OSINT montrent l'impact des frappes iraniennes contre la base américaine d'Al Udeid au Qatar. Survenue dans la nuit du 23 au 24 juin 2025, cette salve de missiles balistiques était une réponse aux frappes américaines sur des installations nucléaires
·numerama.com·
Des images satellites montrent l’impact des frappes iraniennes sur la base américaine au Qatar (photos)
DOGE Denizen Marko Elez Leaked API Key for xAI
DOGE Denizen Marko Elez Leaked API Key for xAI
Marko Elez, a 25-year-old employee at Elon Musk's Department of Government Efficiency (DOGE), has been granted access to sensitive databases at the U.S. Social Security Administration, the Treasury and Justice departments, and the Department of Homeland Security. So it should…
·krebsonsecurity.com·
DOGE Denizen Marko Elez Leaked API Key for xAI
UK launches vulnerability research program for external experts
UK launches vulnerability research program for external experts
UK's National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external cybersecurity experts.
·bleepingcomputer.com·
UK launches vulnerability research program for external experts
Interlock ransomware adopts FileFix method to deliver malware
Interlock ransomware adopts FileFix method to deliver malware
Hackers have adopted the new technique called 'FileFix' in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems.
·bleepingcomputer.com·
Interlock ransomware adopts FileFix method to deliver malware
The Unusual Suspect: Git Repos
The Unusual Suspect: Git Repos
🚨 A fake CAPTCHA is all it takes. Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix that hijacks File Ex
·thehackernews.com·
The Unusual Suspect: Git Repos
Piracy sites for Nintendo Switch, PS4 games taken down by FBI
Piracy sites for Nintendo Switch, PS4 games taken down by FBI
Last week, the FBI’s Atlanta field office announced the seizure of nsw2u.com, nswdl.com, game-2u.com, bigngame.com, ps4pkg.com, ps4pkg.net and mgnetu.com — placing FBI banners on all of the sites.
·therecord.media·
Piracy sites for Nintendo Switch, PS4 games taken down by FBI
Is AI “healthy” to use? (Lock and Code S06E14)
Is AI “healthy” to use? (Lock and Code S06E14)
This week on the Lock and Code podcast, we speak with Anna Brading and Zach Hinkle about whether using AI is damaging for our health.
·malwarebytes.com·
Is AI “healthy” to use? (Lock and Code S06E14)
Malicious VSCode extension in Cursor IDE led to $500K crypto theft
Malicious VSCode extension in Cursor IDE led to $500K crypto theft
A fake extension for the Cursor AI IDE code editor infected devices with remote access tools and infostealers, which, in one case, led to the theft of $500,000 in cryptocurrency from a Russian crypto developer.
·bleepingcomputer.com·
Malicious VSCode extension in Cursor IDE led to $500K crypto theft
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls.
·bleepingcomputer.com·
Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot